-
3
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
New York, NY, USA: ACM
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds," in CCS '09: Proceedings of the 16th ACM conference on Computer and communications security. New York, NY, USA: ACM, 2009, pp. 199-212.
-
(2009)
CCS '09: Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
5
-
-
70349750047
-
The eucalyptus open-source cloud-computing system
-
May
-
D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman, L. Youseff, and D. Zagorodnov, "The Eucalyptus open-source cloud-computing system," in Proceedings of the 9th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID '09), May 2009, pp. 124-131.
-
(2009)
Proceedings of the 9th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID '09)
, pp. 124-131
-
-
Nurmi, D.1
Wolski, R.2
Grzegorczyk, C.3
Obertelli, G.4
Soman, S.5
Youseff, L.6
Zagorodnov, D.7
-
6
-
-
78349257693
-
-
"EC2 web site," http://aws.amazon.com/ec2/.
-
EC2 Web Site
-
-
-
7
-
-
78349242379
-
-
"KVM web site," http://www.linux-kvm.org.
-
KVM Web Site
-
-
-
8
-
-
21644433634
-
-
ACM New York, NY, USA
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfleld, "Xen and the art of virtualization," vol. 37, no. 5. ACM New York, NY, USA, 2003, pp. 164-177.
-
(2003)
Xen and the Art of Virtualization
, vol.37
, Issue.5
, pp. 164-177
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfleld, A.9
-
9
-
-
78349298181
-
-
IEEE 802.1Q
-
"Vlan tagging," IEEE 802.1Q.
-
Vlan Tagging
-
-
-
10
-
-
85090433665
-
Snort: Lightweight intrusion detection for networks
-
Seattle, WA, USA. USENIX, Nov.
-
M. Roesch, "Snort: Lightweight intrusion detection for networks," in Proceedings of the 13th USENIX Conference on Systems Administration (LISA-99), Seattle, WA, USA. USENIX, Nov. 1999, pp. 229-238.
-
(1999)
Proceedings of the 13th USENIX Conference on Systems Administration (LISA-99)
, pp. 229-238
-
-
Roesch, M.1
-
12
-
-
78349265222
-
-
"Sip invite flooder," http://www.hackingvoip.com/tools/ inviteflood.tar.gz.
-
-
-
-
14
-
-
84870692036
-
Intrusion detection techniques in grid and cloud computing environment
-
PrePrints
-
K. Vieira, A. Schulter, C. Westphall, and C. Westphall, "Intrusion detection techniques in grid and cloud computing environment," IT Professional, vol. 99, no. PrePrints, 2009.
-
(2009)
IT Professional
, vol.99
-
-
Vieira, K.1
Schulter, A.2
Westphall, C.3
Westphall, C.4
-
15
-
-
24944472363
-
Towards a grid-wide intrusion detection system
-
Amsterdam, The Netherlands, February
-
B. C. Stuart Kenny, "Towards a grid-wide intrusion detection system," in Proceedings of the European Grid Conference (EGC2005), pp. 275-284, Amsterdam, The Netherlands, February 2005.
-
(2005)
Proceedings of the European Grid Conference (EGC2005)
, pp. 275-284
-
-
Stuart Kenny, B.C.1
|